Author:
Chevalier Yannick,Rusinowitch Michael
Subject
General Computer Science,Theoretical Computer Science
Reference31 articles.
1. On the symbolic reduction of processes with cryptographic functions;Amadio;Theoretical Computer Science,2003
2. Symbolic trace analysis of cryptographic protocols;Boreale,2001
3. Protocol insecurity with finite number of sessions is np-complete;Rusinowitch,2001
4. J. Millen, V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, in: ACM Conference on Computer and Communications Security, 2001, pp. 166–175
5. Automata-based analysis of recursive cryptographic protocols;Küsters,2004
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献